Informatica - Volume 17, issue 4

Purchase individual online access for 1 year to this journal.

Price: EUR 70.00

ISSN 0868-4952 (P)
ISSN 1822-8844 (E)

The quarterly journal Informatica provides an international forum for high-quality original research and publishes papers on mathematical simulation and optimization, recognition and control, programming theory and systems, automation systems and elements. Informatica provides a multidisciplinary forum for scientists and engineers involved in research and design including experts who implement and manage information systems applications.

The aims are:

- To provide a balanced representation of theory and applications- To cover the research results of both the East and the West equally- To provide fast publication of quality papers by the efficient work of referees- To provide an early access to the information by presenting the PDF files of the complete papers on the Internet.

All these aims taken together explain the unique quality of this journal and how it is distinguished from other journals in the rapidly expanding field.

Abstract: We revisit the password-based group key exchange protocol due to Lee et al. (2004), which carries a claimed proof of security in the Bresson et al. model under the intractability of the Decisional Diffie–Hellman problem (DDH) and Computational Diffie–Hellman (CDH) problem. We reveal a previously unpublished flaw in the protocol and its proof, whereby we demonstrate that the protocol violates the definition of security in the model. To provide a better insight into the protocol and proof failures, we present a fixed protocol. We hope our analysis will enable similar mistakes to be avoided in the future. We also revisit…protocol 4 of Song and Kim (2000), and reveal a previously unpublished flaw in the protocol (i.e., a reflection attack).
Show more

Abstract: In this paper optimization of DSR is achieved using New Link Cache structure and Source Transparent Route Maintenance Method. The new link cache effectively utilizes the memory by caching the routes in adjacent list type of data structures. It selects the shortest hop and least congested path, which in turn reduce the control packets, route request packets, route reply packets and increase the data packets forwarded by the nodes. To solve the DSR route maintenance problem during high mobility, source transparent route maintenance method is introduced in this paper. This method has two schemes namely cache validation and local route…repair. These schemes reduce the packet loss, end-to-end delay and increase the throughput.
Show more

Abstract: The quality of software engineering projects often suffers due to the large gap between the way stakeholders present their requirements and the way analysts capture and express those requirements. With this problem in mind the new method for business rules driven IS requirements specification has been developed. In this paper the architecture of the requirements repository, which is at the core of the proposed method, is presented. The repository model supports the storage and management of all components of the captured requirements, including functions, business decisions, data sources, conceptual data model elements, business rules and their templates. The important aspects…of the specialised requirements specification tool implementation are also overviewed.
Show more

Abstract: This paper proposes a threshold key escrow scheme from pairing. It tolerates the passive adversary to access any internal data of corrupted key escrow agents and the active adversary that can make corrupted servers to deviate from the protocol. The scheme is secure against threshold adaptive chosen-ciphertext attack. The formal proof of security is presented in the random oracle model, assuming the decision Bilinear Diffie-Hellman problem is computationally hard.

Abstract: Matrix transpose in parallel systems typically involves costly all-to-all communications. In this paper, we provide a comparative characterization of various efficient algorithms for transposing small and large matrices using the popular symmetric multiprocessors (SMP) architecture, which carries a relatively low communication cost due to its large aggregate bandwidth and low-latency inter-process communication. We conduct analysis on the cost of data sending / receiving and the memory requirement of these matrix-transpose algorithms. We then propose an adaptive algorithm that can minimize the overhead of the matrix transpose operations given the parameters such as the data size, number of processors, start-up time,…and the effective communication bandwidth.
Show more

Abstract: One important requirement of electronic cash systems is the anonymity of customers. Unconditional anonymity is also very well suited to support criminals in blackmailing. Maitland and Boyd proposed at ICICS 2001 an offline electronic cash system based on a group signature scheme. Their scheme cannot be used to solve blackmailing and other anonymity problems such as money laundering and illegal purchases. Chen, Zhang and Wang suggested an offline electronic cash scheme to prevent blackmailing by using the group blind signature. In their payment system, they used a group signature scheme of Camenisch and Stadler for large groups which is not…secure. In this paper we improve these electronic cash systems to prevent blackmailing, money laundering and illegal purchases by using a secure coalition-resistant group blind signature scheme.
Show more

Abstract: Robust stability results for nominally linear hybrid systems are obtained from total stability theorems for purely continuous-time and discrete-time systems. The class of hybrid systems dealt with consists of, in general, coupled continuous-time and digital systems subject to state perturbations whose nominal (i.e., unperturbed) parts are linear and time-varying, in general. The obtained sufficient conditions on robust stability are dependent on the values of the parameters defining the over-bounding functions of the uncertainties and the weakness of the coupling between the analog and digital sub-states provided that the corresponding uncoupled nominal subsystems are both exponentially stable.

Abstract: A convertible authenticated encryption scheme allows a specified recipient to recover and verify a message simultaneously. Moreover the recipient can prove the dishonesty of the sender to any third party if the sender repudiates her signature later. Recently, Lv et al. (2005) showed that the Wu et al.'s (1999) and the Huang et al.'s (2003) convertible authenticated encryption schemes cannot provide the semantic security of encrypted messages. Then they proposed a practical convertible authenticated encryption scheme using self-certified public keys, and extended it to one with message linkages when the signed message is large. In this paper, we show that…the verifier can recover messages if given many triples of message, signature and ciphertext in the Lv et al.'s basic convertible authenticated encryption scheme. Finally we propose a new improvement to these schemes to overcome this weakness and to improve its efficiency.
Show more

Abstract: There is presented a technique of transcribing Lithuanian text into phonemes for speech recognition. Text-phoneme transformation has been made by formal rules and the dictionary. Formal rules were designed to set the relationship between segments of the text and units of formalized speech sounds – phonemes, dictionary – to correct transcription and specify stress mark and position. Proposed the automatic transcription technique was tested by comparing its results with manually obtained ones. The experiment has shown that less than 6% of transcribed words have not matched.

Abstract: The paper analyses the problem of ranking accuracy in multiple criteria decision-making (MCDM) methods. The methodology for measuring the accuracy of determining the relative significance of alternatives as a function of the criteria values is developed. An algorithm of the Technique for the Order Preference by Similarity to Ideal Solution (TOPSIS) that applies criteria values' transformation through a normalization of vectors and the linear transformation is considered. A computational experiment is presented, to compare the results of a multiple criteria analysis and the ranking accuracy in a particular situation.